메뉴 건너뛰기




Volumn , Issue , 2012, Pages 527-532

Detection of exhaustion attacks over IEEE 802.15.4 MAC layer using fuzzy logic system

Author keywords

DDoS; Detection; Exhaustion attacks; FLS; IEEE 802.15.4; MAC Layer; Security

Indexed keywords

DDOS; EXHAUSTION ATTACKS; FLS; IEEE 802.15.4; MAC LAYER; SECURITY;

EID: 84874361693     PISSN: 21647143     EISSN: 21647151     Source Type: Conference Proceeding    
DOI: 10.1109/ISDA.2012.6416593     Document Type: Conference Paper
Times cited : (6)

References (29)
  • 1
    • 34547251000 scopus 로고    scopus 로고
    • Performance Analysis of IEEE 802.15.4 and ZigBee for Large-Scale Wireless Sensor Network Applications
    • ACM
    • Mikko Kohvakka, Mauri Kuorilehto "Performance Analysis of IEEE 802.15.4 and ZigBee for Large-Scale Wireless Sensor Network Applications" PE-WASUN'06, ACM, Vol: 487, PP: 48-57, 2006.
    • (2006) PE-WASUN'06 , vol.487 , pp. 48-57
    • Kohvakka, M.1    Kuorilehto, M.2
  • 3
    • 84869438107 scopus 로고    scopus 로고
    • A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks
    • Salem M., Sarhan A., Abu-Bakr M.. "A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks", ICGSTCNIR, Volume 7, No.1, 2007.
    • (2007) ICGSTCNIR , vol.7 , Issue.1
    • Salem, M.1    Sarhan, A.2    Abu-Bakr, M.3
  • 6
    • 84874384931 scopus 로고    scopus 로고
    • Comparative analysis of detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network
    • DOI: 10.1016
    • C.Balarengadurai, S Saraswathi. "Comparative analysis of detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network" in proceedings of Elsevier Procedia Engineering, Vol:38, pp:3855-3863, DOI: 10.1016,2012.
    • (2012) Proceedings of Elsevier Procedia Engineering , vol.38 , pp. 3855-3863
    • Balarengadurai, C.1    Saraswathi, S.2
  • 7
    • 80054858261 scopus 로고    scopus 로고
    • Different types of attacks in integrate MANET internet communication
    • Abhay kumar Rai, Rajiv Ranjan "Different types of attacks in integrate MANET internet communication", IJCSS, Vol: 4, PP: 265-274, 2010.
    • (2010) IJCSS , vol.4 , pp. 265-274
    • Rai, A.K.1    Ranjan, R.2
  • 8
    • 77952147526 scopus 로고    scopus 로고
    • Fuzzy Logic-based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks
    • Zubair A. Baig, Salman A. Khan "Fuzzy Logic-based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks" in IEEE conference on Future Networks, PP:185-190,2010
    • (2010) IEEE Conference on Future Networks , pp. 185-190
    • Baig, Z.A.1    Khan, S.A.2
  • 9
    • 78549251230 scopus 로고    scopus 로고
    • A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-based Wireless Sensor Networks
    • Z. A. Baig and A. I. Khan, "A Fault-Tolerant Scheme for Detection of DDoS Attack Patterns in Cluster-based Wireless Sensor Networks," Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects, pp. 277290, 2008.
    • (2008) Sensor and AdHoc Networks: Theoretical and Algorithmic Aspects , pp. 277290
    • Baig, Z.A.1    Khan, A.I.2
  • 14
    • 27544469503 scopus 로고    scopus 로고
    • A study on fuzzy intrusion detection
    • Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security
    • J. T. Yao, S. L. Zhao, L. V. Saxton, "A study on fuzzy intrusion detection", In Proc. of SPIE Vol. 5812, Data Mining, Intrusion Detection, Information Assurance, And Data Networks Security, pp: 23-30, 2005.
    • (2005) Proc. of SPIE , vol.5812 , pp. 23-30
    • Yao, J.T.1    Zhao, S.L.2    Saxton, L.V.3
  • 16
    • 69249213464 scopus 로고    scopus 로고
    • Network forensics based on fuzzy logic and expert system
    • N. Liao, S. Tiana, T. Wanga, "Network forensics based on fuzzy logic and expert system", Computer Communications, Vol. 32, no. 17, pp. 1881-1892, 2009.
    • (2009) Computer Communications , vol.32 , Issue.17 , pp. 1881-1892
    • Liao, N.1    Tiana, S.2    Wanga, T.3
  • 17
    • 78549240053 scopus 로고    scopus 로고
    • An Approach to a New Network Security architecture for Academic Environments
    • M. Mohajerani, A. Moeini, "An Approach to a New Network Security architecture for Academic Environments". Lecture Notes in Computer Science, Volume 2434, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2434
    • Mohajerani, M.1    Moeini, A.2
  • 19
    • 78549247632 scopus 로고    scopus 로고
    • Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report injection by Replaying an attack
    • J. H. Kim, T. H. Cho, "Interleaved Hop-by-Hop Authentication using fuzzy logic to defend against of False Report injection by Replaying an attack", International Journal of Computer Science and Network Security, Vol. 9, no.7, pp. 91-96, 2009,
    • (2009) International Journal of Computer Science and Network Security , vol.9 , Issue.7 , pp. 91-96
    • Kim, J.H.1    Cho, T.H.2
  • 23
    • 0032667848 scopus 로고    scopus 로고
    • Minimum energy mobile wireless networks
    • Aug
    • V. Rodoplu, and T. Meng. "Minimum energy mobile wireless networks," IEEE J. S elected Areas in Communications, vol. 17, no. 8, pp. 1333-3344, Aug 2008.
    • (2008) IEEE J. S Elected Areas in Communications , vol.17 , Issue.8 , pp. 1333-3344
    • Rodoplu, V.1    Meng, T.2
  • 24
    • 78549288531 scopus 로고    scopus 로고
    • On the Use of Unified And-Or Fuzzy Operator for Distributed Node Exhaustion Attack Decision-making in Wireless Sensor Networks
    • Salman A. Khan, Zubair A. Baig, "On the Use of Unified And-Or Fuzzy Operator for Distributed Node Exhaustion Attack Decision-making in Wireless Sensor Networks" IEEE Transaction on Fuzzy systems,PP: 978-987,2010.
    • (2010) IEEE Transaction on Fuzzy Systems , pp. 978-987
    • Khan, S.A.1    Baig, Z.A.2
  • 25
    • 79951737949 scopus 로고    scopus 로고
    • A Triangle module operator and Fuzzy Logic Based Han doff Algorithm for Heterogeneous Wireless Network
    • ISBN: 9784-4244-6868-3
    • Sheng Jie Tang Liangrui "A Triangle module operator and Fuzzy Logic Based Han doff Algorithm for Heterogeneous Wireless Network"12th IEEE International Conference on Communication Technology, ISBN: 9784-4244-6868-3, pp: 448-451, 2011.
    • (2011) 12th IEEE International Conference on Communication Technology , pp. 448-451
    • Jie, S.1    Liangrui, T.2
  • 26
    • 84868268469 scopus 로고    scopus 로고
    • A Fuzzy Logic System for Detecting Ping Pong Effect Attack in IEEE 802.15.4 Low Rate Wireless Personal Area Network
    • Springer Verlag, DOI: 10.1007/978-3-642-32063-7-43
    • C.Balarengadurai, S Saraswathi, "A Fuzzy Logic System for Detecting Ping Pong Effect Attack in IEEE 802.15.4 Low Rate Wireless Personal Area Network" in proceedings of Advances in Intelligent Systems and Computing-Springer Verlag, Vol: 182, pp: 405-416, DOI: 10.1007/978-3-642-32063- 7-43, 2012.
    • (2012) Proceedings of Advances in Intelligent Systems and Computing , vol.182 , pp. 405-416
    • Balarengadurai, C.1    Saraswathi, S.2
  • 27
    • 77951710463 scopus 로고    scopus 로고
    • Information Warfare-Worthy Jamming Attack DetectionMechanism for Wireless Sensor Networks Using a Fuzzy Inference System
    • doi:10.3390/s100403444
    • Sudip Misra, Ranjit Singh, S. V. Rohith Mohan "Information Warfare-Worthy Jamming Attack DetectionMechanism for Wireless Sensor Networks Using a Fuzzy Inference System" Sensors open aceess Vol:10, pp.3444-3479; doi:10.3390/s100403444, 2010.
    • (2010) Sensors Open Aceess , vol.10 , pp. 3444-3479
    • Misra, S.1    Singh, R.2    Rohith Mohan, S.V.3
  • 29
    • 84874377617 scopus 로고    scopus 로고
    • A Fuzzy based Detection Technique for Jamming Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network
    • Springer Verlag-LNEE
    • C.Balarengadurai, S Saraswathi, "A Fuzzy based Detection Technique for Jamming Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network" in proceedings of Advances in Intelligent Systems and Computing-Springer Verlag-LNEE, pp: 422-433,2012.
    • (2012) Proceedings of Advances in Intelligent Systems and Computing , pp. 422-433
    • Balarengadurai, C.1    Saraswathi, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.